Cybersecurity

New Research Points to Hidden Vulnerabilities Within Machine Learning Systems

Agencies need to provide extra attention and security for machine learning and artificial intelligence-based systems, beyond the normal level of cybersecurity protection.

Cybersecurity

Log4j Vulnerability Prompts Lawmakers to Examine Agency Cyber Measures

House Energy and Commerce Committee leaders asked several federal agencies about mitigation efforts, following a previous CISA emergency directive about the vulnerability.

Data

FTC Contemplates Rules to Protect Against Commercial Surveillance and Lax Data Privacy

The Commission voted Thursday to issue a notice of their proposed rulemaking and solicit public comment.

Sponsor Content

5G’s Role in Next-level Infrastructure

5G is set to be a crucial part of the infrastructure that powers a range of technologies that rely on next-generation connectivity.

Cybersecurity

CISA Releases Cybersecurity Toolkit to Help Protect Upcoming Midterm Elections

The guide for state and local election officials offers free tools to help mitigate digital threats and safeguard voting systems from outside intrusion.

Emerging Tech

The U.S. Army Is Hunting For More Soldier-Connected Tech

A recent solicitation calls for soldier-centered networking and information technology that will link existing and prototype technologies together.

Cybersecurity

VA Systems Vulnerable to Cyber Intrusions Due to Lack of Effective Oversight, Report Says

The Department of Veterans Affairs Inspector General's office said the agency is "leaving its systems vulnerable to compromise by impostors who may gain access to protected information."

Cybersecurity

Cyber Threats Warrant a Government Reorganization, Former CISA Head Says

Inaugural CISA director Chris Krebs said the federal government should do more to respond to cybersecurity and data concerns.

Emerging Tech

Energy Asks for New R&D in Critical Materials for Clean Energy

The Department of Energy launched its new request for information days after the passage of the CHIPS Act.

IT Modernization

The CHIPS and Science Act Became Law, Now What?

Signing the CHIPS and Science Act was just the start for enhancing U.S. economic strength and national security. 

Sponsor Content

Compliance at the Speed of Digital Transformation

Compliance has become the equal and opposite force to digital transformation.

Cybersecurity

'Hack DHS' Bug Bounty Program to Begin Second Phase with New Contract Request

The contract is geared toward companies that can conduct crowdsourced events and competitions for vetted security researchers, to help bolster DHS’ cyber resilience.

IT Modernization

DHS Research Arm Seeks Science, Tech Capabilities to Protect U.S. Agriculture

The agency issued a request for information to support its Food, Agriculture and Veterinary Defense program.

Ideas

New Photos Suggest How Trump, Flush with Power, May Have Sent Official Documents down the Toilet

Photos showing what appear to be torn-up documents in two different toilets may provide more evidence of the former president’s habit of destroying his presidential documents.

Emerging Tech

Mobile Threats Prompt Operational Changes for Government Staff

More than 80% of public sector respondents to a recent survey said they have been forced to re-evaluate workplace practices as attacks on mobile devices grow.

CXO Briefing

The Pentagon’s Plan to Speed Up Software Buying for Weapons Systems

The DOD’s dedicated software acquisition pathway is nearly two years old, and is already being used by a few dozen programs.

Cybersecurity

FCC, FEMA Raise Alarm Bells About Vulnerabilities in Emergency Alert System

Both agencies warned that software and equipment vulnerabilities could allow hackers to transmit fake emergency messages or disrupt real ones. 

Policy

FEC to Vote on Google’s Plan to Keep Campaign Emails Out of Spam

Google’s proposal to allow emails from authorized candidates and committees to be exempt from the company’s spam filters has received pushback from Democrats, Republicans and the general public.

Cybersecurity

Top Malware of 2021 Has Been in Use for Years, CISA Warns

The advisory highlights that such usage offers “opportunities to better prepare” and provides recommendations to mitigate cybersecurity threats.

Podcasts

Critical Update: Where the Final Frontier Meets Your Front Door

NASA invents a lot of cool and cutting edge technology to make space exploration possible—tech that often ends up pretty close to home as well.